Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 02:02
Static task
static1
Behavioral task
behavioral1
Sample
0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe
-
Size
512KB
-
MD5
0229f4c852b759575d57f4cfd8868a30
-
SHA1
4861969eaf8b8ec2d516f1cb054dfcbcde1e7431
-
SHA256
48d2afb7b7d80c9507169504ea8dc1e6b2812e550cc77dd05d3ef4578eac4224
-
SHA512
ee03efca071977fab6a087e99bad4f9d74d251590a5f3a70895e30a6c9eb8593447f1152628274468164db0e5f6d4082d49bb6d482da48baa2e7535681774a97
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj64:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5f
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cwksczzzou.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cwksczzzou.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" cwksczzzou.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" cwksczzzou.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" cwksczzzou.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" cwksczzzou.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" cwksczzzou.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cwksczzzou.exe -
Executes dropped EXE 5 IoCs
pid Process 2160 cwksczzzou.exe 2156 lgyfcxzvnocjqzz.exe 2624 ujoxycgz.exe 2716 huiapnmneniwj.exe 2508 ujoxycgz.exe -
Loads dropped DLL 5 IoCs
pid Process 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 2160 cwksczzzou.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" cwksczzzou.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" cwksczzzou.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" cwksczzzou.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" cwksczzzou.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" cwksczzzou.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" cwksczzzou.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "huiapnmneniwj.exe" lgyfcxzvnocjqzz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\txpqmvmo = "cwksczzzou.exe" lgyfcxzvnocjqzz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mibsdpfl = "lgyfcxzvnocjqzz.exe" lgyfcxzvnocjqzz.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\v: cwksczzzou.exe File opened (read-only) \??\n: ujoxycgz.exe File opened (read-only) \??\r: ujoxycgz.exe File opened (read-only) \??\l: cwksczzzou.exe File opened (read-only) \??\x: cwksczzzou.exe File opened (read-only) \??\o: ujoxycgz.exe File opened (read-only) \??\s: ujoxycgz.exe File opened (read-only) \??\a: cwksczzzou.exe File opened (read-only) \??\j: ujoxycgz.exe File opened (read-only) \??\q: ujoxycgz.exe File opened (read-only) \??\g: cwksczzzou.exe File opened (read-only) \??\u: cwksczzzou.exe File opened (read-only) \??\y: cwksczzzou.exe File opened (read-only) \??\e: ujoxycgz.exe File opened (read-only) \??\p: ujoxycgz.exe File opened (read-only) \??\s: ujoxycgz.exe File opened (read-only) \??\a: ujoxycgz.exe File opened (read-only) \??\k: ujoxycgz.exe File opened (read-only) \??\r: cwksczzzou.exe File opened (read-only) \??\y: ujoxycgz.exe File opened (read-only) \??\i: ujoxycgz.exe File opened (read-only) \??\y: ujoxycgz.exe File opened (read-only) \??\i: ujoxycgz.exe File opened (read-only) \??\b: ujoxycgz.exe File opened (read-only) \??\n: ujoxycgz.exe File opened (read-only) \??\e: ujoxycgz.exe File opened (read-only) \??\t: ujoxycgz.exe File opened (read-only) \??\h: ujoxycgz.exe File opened (read-only) \??\p: ujoxycgz.exe File opened (read-only) \??\w: ujoxycgz.exe File opened (read-only) \??\h: cwksczzzou.exe File opened (read-only) \??\v: ujoxycgz.exe File opened (read-only) \??\u: ujoxycgz.exe File opened (read-only) \??\x: ujoxycgz.exe File opened (read-only) \??\k: cwksczzzou.exe File opened (read-only) \??\b: ujoxycgz.exe File opened (read-only) \??\m: ujoxycgz.exe File opened (read-only) \??\l: ujoxycgz.exe File opened (read-only) \??\p: cwksczzzou.exe File opened (read-only) \??\s: cwksczzzou.exe File opened (read-only) \??\u: ujoxycgz.exe File opened (read-only) \??\o: cwksczzzou.exe File opened (read-only) \??\w: ujoxycgz.exe File opened (read-only) \??\x: ujoxycgz.exe File opened (read-only) \??\j: ujoxycgz.exe File opened (read-only) \??\k: ujoxycgz.exe File opened (read-only) \??\z: cwksczzzou.exe File opened (read-only) \??\m: ujoxycgz.exe File opened (read-only) \??\g: ujoxycgz.exe File opened (read-only) \??\i: cwksczzzou.exe File opened (read-only) \??\m: cwksczzzou.exe File opened (read-only) \??\n: cwksczzzou.exe File opened (read-only) \??\t: cwksczzzou.exe File opened (read-only) \??\r: ujoxycgz.exe File opened (read-only) \??\e: cwksczzzou.exe File opened (read-only) \??\q: cwksczzzou.exe File opened (read-only) \??\a: ujoxycgz.exe File opened (read-only) \??\g: ujoxycgz.exe File opened (read-only) \??\o: ujoxycgz.exe File opened (read-only) \??\z: ujoxycgz.exe File opened (read-only) \??\t: ujoxycgz.exe File opened (read-only) \??\b: cwksczzzou.exe File opened (read-only) \??\h: ujoxycgz.exe File opened (read-only) \??\l: ujoxycgz.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" cwksczzzou.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" cwksczzzou.exe -
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2880-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x0009000000015018-5.dat autoit_exe behavioral1/files/0x00090000000149f5-17.dat autoit_exe behavioral1/files/0x00080000000155f7-28.dat autoit_exe behavioral1/files/0x0007000000015605-33.dat autoit_exe behavioral1/files/0x0006000000015d31-71.dat autoit_exe behavioral1/files/0x0006000000015d98-77.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\cwksczzzou.exe 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\cwksczzzou.exe 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe File created C:\Windows\SysWOW64\ujoxycgz.exe 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ujoxycgz.exe 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe File created C:\Windows\SysWOW64\huiapnmneniwj.exe 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe File created C:\Windows\SysWOW64\lgyfcxzvnocjqzz.exe 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\lgyfcxzvnocjqzz.exe 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\huiapnmneniwj.exe 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll cwksczzzou.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe ujoxycgz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal ujoxycgz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal ujoxycgz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe ujoxycgz.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe ujoxycgz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe ujoxycgz.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe ujoxycgz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe ujoxycgz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal ujoxycgz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal ujoxycgz.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe ujoxycgz.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe ujoxycgz.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe ujoxycgz.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe ujoxycgz.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F568C4FF1F22D9D27DD1A88A749165" 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh cwksczzzou.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf cwksczzzou.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33402D7F9C2282256A3F77A177552DAD7D8165DC" 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184DC67815E0DBC3B8C07FE4EDE334BE" 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg cwksczzzou.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2640 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 2160 cwksczzzou.exe 2160 cwksczzzou.exe 2160 cwksczzzou.exe 2160 cwksczzzou.exe 2160 cwksczzzou.exe 2156 lgyfcxzvnocjqzz.exe 2156 lgyfcxzvnocjqzz.exe 2156 lgyfcxzvnocjqzz.exe 2156 lgyfcxzvnocjqzz.exe 2624 ujoxycgz.exe 2624 ujoxycgz.exe 2624 ujoxycgz.exe 2624 ujoxycgz.exe 2156 lgyfcxzvnocjqzz.exe 2716 huiapnmneniwj.exe 2716 huiapnmneniwj.exe 2716 huiapnmneniwj.exe 2716 huiapnmneniwj.exe 2716 huiapnmneniwj.exe 2716 huiapnmneniwj.exe 2508 ujoxycgz.exe 2508 ujoxycgz.exe 2508 ujoxycgz.exe 2508 ujoxycgz.exe 2156 lgyfcxzvnocjqzz.exe 2716 huiapnmneniwj.exe 2716 huiapnmneniwj.exe 2156 lgyfcxzvnocjqzz.exe 2156 lgyfcxzvnocjqzz.exe 2716 huiapnmneniwj.exe 2716 huiapnmneniwj.exe 2156 lgyfcxzvnocjqzz.exe 2716 huiapnmneniwj.exe 2716 huiapnmneniwj.exe 2156 lgyfcxzvnocjqzz.exe 2716 huiapnmneniwj.exe 2716 huiapnmneniwj.exe 2156 lgyfcxzvnocjqzz.exe 2716 huiapnmneniwj.exe 2716 huiapnmneniwj.exe 2156 lgyfcxzvnocjqzz.exe 2716 huiapnmneniwj.exe 2716 huiapnmneniwj.exe 2156 lgyfcxzvnocjqzz.exe 2716 huiapnmneniwj.exe 2716 huiapnmneniwj.exe 2156 lgyfcxzvnocjqzz.exe 2716 huiapnmneniwj.exe 2716 huiapnmneniwj.exe 2156 lgyfcxzvnocjqzz.exe 2716 huiapnmneniwj.exe 2716 huiapnmneniwj.exe 2156 lgyfcxzvnocjqzz.exe 2716 huiapnmneniwj.exe 2716 huiapnmneniwj.exe 2156 lgyfcxzvnocjqzz.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 2160 cwksczzzou.exe 2160 cwksczzzou.exe 2160 cwksczzzou.exe 2156 lgyfcxzvnocjqzz.exe 2156 lgyfcxzvnocjqzz.exe 2624 ujoxycgz.exe 2156 lgyfcxzvnocjqzz.exe 2624 ujoxycgz.exe 2624 ujoxycgz.exe 2716 huiapnmneniwj.exe 2716 huiapnmneniwj.exe 2716 huiapnmneniwj.exe 2508 ujoxycgz.exe 2508 ujoxycgz.exe 2508 ujoxycgz.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 2160 cwksczzzou.exe 2160 cwksczzzou.exe 2160 cwksczzzou.exe 2156 lgyfcxzvnocjqzz.exe 2156 lgyfcxzvnocjqzz.exe 2156 lgyfcxzvnocjqzz.exe 2624 ujoxycgz.exe 2624 ujoxycgz.exe 2624 ujoxycgz.exe 2716 huiapnmneniwj.exe 2716 huiapnmneniwj.exe 2716 huiapnmneniwj.exe 2508 ujoxycgz.exe 2508 ujoxycgz.exe 2508 ujoxycgz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2640 WINWORD.EXE 2640 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2160 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 28 PID 2880 wrote to memory of 2160 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 28 PID 2880 wrote to memory of 2160 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 28 PID 2880 wrote to memory of 2160 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 28 PID 2880 wrote to memory of 2156 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 29 PID 2880 wrote to memory of 2156 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 29 PID 2880 wrote to memory of 2156 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 29 PID 2880 wrote to memory of 2156 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 29 PID 2880 wrote to memory of 2624 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 30 PID 2880 wrote to memory of 2624 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 30 PID 2880 wrote to memory of 2624 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 30 PID 2880 wrote to memory of 2624 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 30 PID 2880 wrote to memory of 2716 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 31 PID 2880 wrote to memory of 2716 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 31 PID 2880 wrote to memory of 2716 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 31 PID 2880 wrote to memory of 2716 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 31 PID 2160 wrote to memory of 2508 2160 cwksczzzou.exe 32 PID 2160 wrote to memory of 2508 2160 cwksczzzou.exe 32 PID 2160 wrote to memory of 2508 2160 cwksczzzou.exe 32 PID 2160 wrote to memory of 2508 2160 cwksczzzou.exe 32 PID 2880 wrote to memory of 2640 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 33 PID 2880 wrote to memory of 2640 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 33 PID 2880 wrote to memory of 2640 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 33 PID 2880 wrote to memory of 2640 2880 0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe 33 PID 2640 wrote to memory of 2812 2640 WINWORD.EXE 36 PID 2640 wrote to memory of 2812 2640 WINWORD.EXE 36 PID 2640 wrote to memory of 2812 2640 WINWORD.EXE 36 PID 2640 wrote to memory of 2812 2640 WINWORD.EXE 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0229f4c852b759575d57f4cfd8868a30_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\cwksczzzou.execwksczzzou.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\ujoxycgz.exeC:\Windows\system32\ujoxycgz.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2508
-
-
-
C:\Windows\SysWOW64\lgyfcxzvnocjqzz.exelgyfcxzvnocjqzz.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2156
-
-
C:\Windows\SysWOW64\ujoxycgz.exeujoxycgz.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2624
-
-
C:\Windows\SysWOW64\huiapnmneniwj.exehuiapnmneniwj.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2716
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2812
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5df26fbb70d5b0f4bb14558f27cb80391
SHA12c0cc17ff788f9a19926d003b96360f7deb86203
SHA256107898feebd53cc6a3420e44ae616811816934ce9e3ec119d93a4deb621f59d4
SHA51267c773fb3d3f17f7da631d409f8fe3aee7b1a9d992a6c0644f6fc362f8db5ac6abed014e90f6cd56ff1dab72daab137b59d0dbb42287a402f0391182f0e7e944
-
Filesize
20KB
MD56f92d140cbc15a993d074e0802bb8a61
SHA1fdd980aaf43ff7b1399dd42384ac5a6ef21524e7
SHA256b514c63c493297a492280b52fa16bc1c94abcf44b83f92d299299bcf2c13113b
SHA512ed85f781b8a56cccd8cff42e60cdf5ae534fbb997f767c2f6a141e904d38bbf5323b20b80c0b567dae72bbb9c7e0aeb9cac23a60e2566aabeb6f77212c4344e6
-
Filesize
512KB
MD5b619fcc7ab7487766d67b1321686431b
SHA15a006920fc373a2ed44c431e0b0e162a9f83e234
SHA256119fa305197660fc9a9681dec151408d0ecffa8f39ab057232003bc1f4fab25d
SHA512fb29a390fdfd6a8bcb8064ac5f687bdabf3f5148b5b318022536fcaea442f7e5f447b3d7bb224d832c26c4ff9fae1235e24cb9c1533c87d4ce8a3c9fdac9b67c
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD59f8ed046383d18e1babd0f5f5ea01282
SHA1f8423cb99a31034a556ddd08a6b11ea4acfbe0db
SHA25625cc89c0ce55ba49b5a45d6bf91016c70e1e52829fc71b455119e7e69c6f8522
SHA5129b0d6060d08cba9974f2bd491b963cf12ad09e3fb900e9c47810b4bc8360e299d9bf6c69ae2df78571da1061a9da9bc0611468464d671c0b13021e53ba451ac5
-
Filesize
512KB
MD509282265cc1dd9a0054e9d131fe45cfc
SHA18612667accb7ae3e0090289e0f8d51f516ed8704
SHA2562dbe412d3e4668ad16481472b6cb57eb3fc335e888be32809789adac1f29a505
SHA5120b85cc5626ba520468594b7c7b4e3b1db9350ee9b394e605b24cd5ee1cbb79eccdb80e2ddb28bac4a48bea65f5e98329007496fec83b4e7af814b371a8a02408
-
Filesize
512KB
MD57b7a790b034c9daea64db3a31517a08f
SHA18061e43688293d881829656c648e850b06fc6768
SHA2567ff4a4d2e92fdedfe5b58b702f48180c101a5afca23f94b09019ce606fcc7599
SHA51285cb0e304b5bc2b7010e2970203ceb9ba4ce7b3aad9fe8bd7794b706a349b51995af250ab34792a1de7e2373b79bcbb2e6dbc6f19e5d1e8121728348ccc18cc3
-
Filesize
512KB
MD5bbcc6cf1131de76440972418295991e4
SHA10940664f6d044271ec8a812780f7e137c2466fe0
SHA25615d1279c56f0d70ae8930ec1a90a03e6769fc682bf4d6430d839d7586ef09922
SHA51230d79e15c4b19c420f0ba9adb0dedf7a599791410e2f2091789b94a87dff33ba4f3c1018c82ca965e791c5a0d89e0942b1c48704416e59d9287ddfe24a1cec7d